File suricata.changes of Package suricata

-------------------------------------------------------------------
Fri Jul 18 11:26:30 UTC 2025 - Eyad Issa <eyadlorenzo@gmail.com>

- Enable source package signature verification
  https://en.opensuse.org/openSUSE:Package_source_verification

- Update keyring. Key ID taken from
  https://docs.suricata.io/en/suricata-8.0.0/verifying-source-files.html#importing-the-oisf-signing-key

-------------------------------------------------------------------
Mon Jul  7 22:37:49 UTC 2025 - Eyad Issa <eyadlorenzo@gmail.com>

- Disable LTO because of build issues when building the Rust
  components.
- Remove htp dependency
- Remove lua dependency
- Enable eBPF support
- Remove old configure flags
- Migrate %setup to %autosetup

- Update to version 8.0.0:
  * Lua breaking changes:
    ~ No ability to load third-party modules in Lua rules
    ~ No access to the “os” Lua library for access to system
      resources such as the file system
    ~ Moving global Lua functions that access Suricata features
      to Lua libraries
  * The general detection engine performance was improved.
  * PCAP reading mode can now process files faster.
  * Suricata initialization has been significantly improved.
  * More protocol conversions to Rust including:
    LibHTP, FTP, ENIP, MIME parsing
  * New protocols: ARP: decoder and logger, DNS over HTTPS (DoH),
    LDAP support, Multicast DNS (mDNS), POP3: decoder and logger,
    SDP: parse traffic over SIP, SIP: parse traffic over TCP,
    Websocket support
  * Data JSON for data sets: enrich alerts using metadata in
    datasets
  * New transforms and keywords: from_base64, entropy, luaxform
  * requires: rules can check for keywords or features
  * Integer keywords: accept hexadecimal notation, negated ranges,
    enumerations, bitmask
  * IPS: Suricata as a Firewall. The firewall mode is considered
    experimental and may be subject to changes during the 8.0
    lifecycle.
  * Lua 5.4 has been “vendored” into the Suricata code base,
    making it always available by default.
  * Lua now runs in a sandboxed environment, so users can allow
    Lua rules with confidence they won’t perform activities such
    as writing to files or opening sockets or other system-level
    access allowed  by an unrestricted Lua runtime.
  * Improvements to output formats
  * Release blog post:
    https://suricata.io/2025/07/08/suricata-8-0-0-released/

-------------------------------------------------------------------
Tue May 27 22:26:52 UTC 2025 - Eyad Issa <eyadlorenzo@gmail.com>

- Update to version 7.0.10:
  * Address a critical issue in 7.0.9 affecting AF_PACKET users:
    setting a BPF would cause Suricata to fail to start up.

- Update to version 7.0.9:
  * LibHTP has been updated to version 0.5.50
  * Fix CVE-2025-29915: HIGH
  * Fix CVE-2025-29917: HIGH
  * CVE-2025-29918: HIGH
  * CVE-2025-29916: Moderate

-------------------------------------------------------------------
Tue Apr 22 14:37:23 UTC 2025 - Eyad Issa <eyadlorenzo@gmail.com>

- Invert libhs inclusion condition to handle other architectures

-------------------------------------------------------------------
Wed Jan 15 16:47:35 UTC 2025 - Eyad Issa <eyadlorenzo@gmail.com>

- Added suricata-devel package
- Added libsuricata package
  * Enable shared library build

- Use pkgconfig to find build dependencies
- Remove coccinelle build dependency

- Only build with XDP/eBPF support when available
- Only build with libmagic/libnet support when available

- Update to version 7.0.8:
  * Various security, performance, accuracy, and stability issues
    have been fixed.
  * This release addresses CVE IDs:
    ~ CVE-2024-55627: CRITICAL
    ~ CVE-2024-55605: CRITICAL
    ~ CVE-2024-55629: HIGH
    ~ CVE-2024-55628: HIGH
    ~ CVE-2024-55626: LOW

- Update to version 7.0.7:
  * LibHTP has been updated to version 0.5.49
  * Various security, performance, accuracy, and stability issues
    have been fixed.
  * This release addresses CVE IDs:
    ~ CVE-2024-45797: CRITICAL
    ~ CVE-2024-47187: CRITICAL
    ~ CVE-2024-47188: CRITICAL
    ~ CVE-2024-47522: HIGH
    ~ CVE-2024-45795: HIGH
    ~ CVE-2024-45796: HIGH

- Update to version 7.0.6
  * Various security, performance, accuracy, and stability issues
    have been fixed.
  * JA4 for TLS and QUIC has been backported to Suricata 7.0.6.
  * These releases address CVE IDs:
    ~ CVE-2024-37151: CRITICAL
    ~ CVE-2024-38536: HIGH
    ~ CVE-2024-38534: HIGH
    ~ CVE-2024-38535: CRITICAL

-------------------------------------------------------------------
Mon Jul 15 17:54:13 UTC 2024 - Eyad Issa <eyadlorenzo@gmail.com>

- Depend on vectorscan, as hyperscan has gone closed source

-------------------------------------------------------------------
Sat Jun 22 18:38:38 UTC 2024 - Eyad Issa <eyadlorenzo@gmail.com>

- Update to version 7.0.5
  * LibHTP has been updated to version 0.5.48. This version is
    bundled with these new Suricata releases.
  * Suricata-Update has been updated to 1.3.3 in Suricata 7.0.5.
  * Various security, performance, accuracy, and stability issues
    have been fixed.
    https://redmine.openinfosecfoundation.org/versions/206
  * These releases address CVE IDs:
    ~ CVE-2024-32663 - Critical severity
    ~ CVE-2024-32664 - High severity
    ~ CVE-2024-32867 - Moderate severity

- Update to version 7.0.4
  * Various security, performance, accuracy, and stability issues
    have been fixed.
    https://redmine.openinfosecfoundation.org/versions/202

-------------------------------------------------------------------
Mon Feb 19 07:26:30 UTC 2024 - Otto Hollmann <otto.hollmann@suse.com>

- Update to version 7.0.3
  * LibHTP required version is 0.5.46. This is the version that is bundled
    with the releases.
  * Various security, performance, accuracy, and stability issues have been fixed.
    https://redmine.openinfosecfoundation.org/versions/200
  * These releases address CVE IDs:
    - CVE-2024-23839 - Critical severity
    - CVE-2024-23836 - Critical severity
    - CVE-2024-23835 - High severity
    - CVE-2024-24568 - Moderate severity

-------------------------------------------------------------------
Thu Oct 19 17:24:49 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>

- Update to version 7.0.2
  * Various security, performance, accuracy, and stability issues have been fixed.
    https://redmine.openinfosecfoundation.org/versions/198

-------------------------------------------------------------------
Mon Sep 25 07:04:49 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>

- Update to version 7.0.1
  * LibHTP required version is 0.5.45. This is the version that is bundled
    with the release.
  * Various security, performance, accuracy, and stability issues have been
    fixed.

-------------------------------------------------------------------
Thu Jul 27 08:44:46 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>

- Update to version 7.0.0
  * Main features:
    - DPDK IDS/IPS 35 support for primary mode was added
    - AF_XDP IDS 17support by Richard McConnell at Rapid7
    - HTTP/HTTP2 new keywords for header inspection
    - TLS: client certificate logging and detection
    - Bittorrent parser by Aaron Bungay
    - IPS: new default DROP behavior for exception policies 7
    - EVE documented and validated with a json schema
    - HTTP/2 support is no longer considered experimental
    - NETMAP API 14
    - Conditional PCAP 43 by Eric Leblond and Scott Jordan
    - Initial libsuricata support
    - VLAN support extended from 2 to 3 layers
  * Performance improvements:
    - file.data MPM split per app protocol
    - New lighter rule profiling mode by Eric Leblond
    - SMB: many fixes and optimizations
    - Hash calculation using Rust crypto instead of NSS
    - Flow manager tuning
    - Many more performance-related counters
    - Stream buffer, which is used by stream engine, file tracking, and more, is more memory efficient
  * Secure Deployment / Security
    - Linux Landlock support added by Eric Leblond
    - Use of setrlimit to prevent Suricata from creating another process
    - Lock cargo crates
    - Default to secure settings for Datasets and Lua
    - Maximum number of transactions for several protocols
    - New Security Policies: https://github.com/OISF/suricata/blob/master/SECURITY.md 15
  * Protocols
    - QUICv1, GQUIC support added. GQUIC contributed by Emmanuel Thompson
    - PostgreSQL support added
    - HTTP/2 deflate decompression, byte-ranges support
    - VN-Tag support
    - Modbus rewritten to Rust with Eve logging added by Simon Dugas
    - IKEv1 support added by Sascha Steinbiss and Frank Honza
    - ESP flow tracking and logging
    - Minimal telnet parser
    - Active flow and TCP counters
    - Network service header
    - Remove dependency on system’s /etc/protocols
  * Rules
    - Added new rule keywords for DHCP, Kerberos, SNMP, TLS, QUIC
    - JA3(s) support for QUIC
    - New (experimental) class of keywords through “frames API”: NFS, SMB, DNS, telnet, SSL/TLS
    - HTTP request files and NFS now support file.data
    - “XOR” transform was added
    - Lua: access to more rule info
    - The byte_test, byte_math, and byte_jump keywords allow a variable name for the byte count value.
    - flow.age keyword was added
  * IPS
    - Exception Policies added to better control packet handling in such conditions as memory caps being hit
    - DPDK support
  * Socket Control
    - Get flow stats over Unix socket
    - Datasets management commands were added
  * Output
    - Conditional packet capture allows packets to be written to disk only after an alert has been triggered
    - New “stream” eve output type for debugging the stream engine
    - Log engine verdict on rejected/dropped/passed packets
  * Dev corner
    - Total: 1375 files changed, 130027 insertions(+), 127626 deletions(-)
    - Rust: 173 files changed, 39279 insertions(+), 13830 deletions(-)
    - C: 978 files changed, 73882 insertions(+), 109446 deletions(-)
    - Docs: 142 files changed, 6636 insertions(+), 1890 deletions(-)
    - Much stricter C compiler flags.
    - Clang’s scan-build clean, which is enforced in CI.
    - CI was expanded.
    - Rust parsers upgraded to using Nom 7
  * Upgrade notes:
    - Suricata 7.0 now uses pcre2 instead of pcre1.
    - The MSRV (minimum supported Rust version) has been updated to 1.63.0 from 1.41.1 minimum in Suricata 6.0.
    - Support for Prelude (libprelude) has been removed
    - Suricata 7.0 requires and bundles libhtp 0.5.45

-------------------------------------------------------------------
Tue Jun 20 07:16:17 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>

- Update to version 6.0.13
  * LibHTP has been updated to 0.5.44. This is a required version that is
    bundled with the release.
  * Security #6119: datasets: absolute path in rules can overwrite arbitrary
    files (6.0.x backport)
  * Bug #6138: Decode-events of IPv6 packets are not triggered
    (6.0.x backport)
  * Bug #6136: suricata-update: dump-sample-configs: configuration files not
    found (6.0.x backport)
  * Bug #6125: http2: cpu overconsumption in rust moving/memcpy in
    http2_parse_headers_blocks (6.0.x backport)
  * Bug #6113: ips: txs still logged for dropped flow (6.0.x backport)
  * Bug #6056: smtp: long line discard logic should be separate for server and
    client (6.0.x backport)
  * Bug #6055: ftp:  long line discard logic should be separate for server and
    client (6.0.x backport)
  * Bug #5990: smtp: any command post a long command gets skipped
    (6.0.x backport)
  * Bug #5982: smtp: Long DATA line post boundary is capped at 4k Bytes
    (6.0.x backport)
  * Bug #5809: smb: convert transaction list to vecdeque (6.0.x backport)
  * Bug #5604: counters: tcp.syn, tcp.synack, tcp.rst depend on flow
    (6.0.x backport)
  * Bug #5550: dns: allow dns messages with invalid opcodes (6.0.x backport)
  * Task #5984: libhtp 0.5.44 (6.0.x backport)
  * Documentation #6134: userguide: add instructions/explanation for
    (not) running suricata with root (6.0.x backport)
  * Documentation #6121: datasets: 6.0.x work-arounds for dataset supply chain
    attacks

-------------------------------------------------------------------
Wed May 10 07:15:41 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>

- Update to version 6.0.12
  * Various performance, accuracy, and stability issues have been fixed.
  * Remove legacy pfring install guide

-------------------------------------------------------------------
Fri Apr 21 12:28:37 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>

- Update to version 6.0.11
  * LibHTP has been updated to 0.5.43. This is a required version that is
    bundled with the release.
  * Various security, performance, accuracy, and stability issues have been
    fixed.

-------------------------------------------------------------------
Thu Feb  9 21:50:04 UTC 2023 - Otto Hollmann <otto.hollmann@suse.com>

- Update to version 6.0.10
  Various security, performance, accuracy, and stability issues have been fixed
  https://forum.suricata.io/t/suricata-6-0-10-released/3175/2
  * Security #5804: Suricata crashes while processing FTP (6.0.x backport)
  * Bug #5815: detect: config keyword prevents tx cleanup (6.0.x backport)
  * Bug #5812: nfs: debug validation triggered on nfs2 read
  * Bug #5810: smb/ntlmssp: parser incorrectly assumes fixed field order
    (6.0.x backport)
  * Bug #5806: exceptions: midstream flows are dropped if
    midstream=true && stream.midstream-policy=drop-flow (6.0.x backport)
  * Bug #5796: TLS Handshake Fragments not Reassembled (6.0.x backport)
  * Bug #5795: detect/udp: different detection from rules when UDP/TCP header is
    broken (6.0.x backport)
  * Bug #5793: decode: Padded packet to minimal Ethernet length marked with
    invalid length event (6.0.x backport)
  * Bug #5791: smb: unbounded file chunk queuing after gap (6.0.x backport)
  * Bug #5763: libbpf: Use of legacy code in eBPF/XDP programs (6.0.x backport)
  * Bug #5762: detect/pcre: JIT not disabled when OS doesn't allow RWX pages
  * Bug #5760: nfs: ASSERT: attempt to subtract with overflow (compound)
    (6.0.x backport)
  * Bug #5749: iprep/ipv6: warning issued on valid reputation input
    (6.0.x backport)
  * Bug #5744: netmap: 6.0.9 v14 backport causes known packet stalls from v14
    implementation in "legacy" mode too
  * Bug #5738: smb: failed assertion
    (!((f->alproto == ALPROTO_SMB && txd->files_logged != 0))),
    function CloseFile, file output-file.c (6.0.x backport)
  * Bug #5735: smtp: quoted-printable encoding skips empty lines in files
    (6.0.x backport)
  * Bug #5723: eve: missing common fields like community id for some event types
    like RFB
  * Bug #5601: detect: invalid hex character in content leads to bad debug
    message (6.0.x backport)
  * Bug #5565: Excessive qsort/msort time when large number of rules using
    tls.fingerprint (6.0.x backport)
  * Bug #5299: YAML warning from default config on 6.0.5
  * Optimization #5797: tls: support incomplete API to replace internal buffering
  * Optimization #5790: smb: set defaults for file chunk limits (6.0.x backport)
- add dependency libhtp >= 0.5.42

-------------------------------------------------------------------
Tue Nov 29 18:46:25 UTC 2022 - Michael Ströder <michael@stroeder.com>

- Update to version 6.0.9
  Various security, performance, accuracy and stability issues have been fixed
  https://forum.suricata.io/t/suricata-6-0-9-released/3012
- build now requires libhtp >= 0.5.42

-------------------------------------------------------------------
Mon Oct  3 11:41:34 UTC 2022 - Martin Hauke <mardnh@gmx.de>

- Use hyperscan-devel instead of 'pkgconfig(libhs)' to prevent:
  "unresolvable: have choice for pkgconfig(libhs): hyperscan-devel
   vectorscan-devel"

-------------------------------------------------------------------
Wed Sep 28 08:06:06 UTC 2022 - Michael Ströder <michael@stroeder.com>

- Update to version 6.0.8
  https://forum.suricata.io/t/suricata-6-0-8-released/2808
  https://forum.suricata.io/t/suricata-6-0-7-released/2807
  https://forum.suricata.io/t/suricata-6-0-6-and-5-0-10-released/2637
- build now requires libhtp >= 0.5.41

-------------------------------------------------------------------
Tue Jun 28 12:13:10 UTC 2022 - Otto Hollmann <otto.hollmann@suse.com>

- Copy config files and update rules
- Add python3-PyYAML as dependency for suricata-update

-------------------------------------------------------------------
Tue Jun 28 11:58:29 UTC 2022 - Otto Hollmann <otto.hollmann@suse.com>

-  Update to version 6.0.5
   https://forum.suricata.io/t/suricata-6-0-5-and-5-0-9-released/2415
-  LibHTP has been updated to 0.5.40. This is a required version that
   is bundled with both releases.
-  Suricata-Update, as bundled with 6.0.5, was updated to 1.2.4.
-  Various security, performance, accuracy and stability issues have
   been fixed.

-------------------------------------------------------------------
Tue Jan 25 15:09:22 UTC 2022 - Hans-Peter Jansen <hpj@urpla.net>

- Update to version 6.0.4:
  https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
- Add luajit build conditional
- More man pages

-------------------------------------------------------------------
Mon Nov  9 11:56:06 UTC 2020 - Hans-Peter Jansen <hpj@urpla.net>

- Update to version 6.0.0:
  https://suricata-ids.org/2020/10/08/suricata-6-0-0-released/
  Upgrade notes:
  https://suricata.readthedocs.io/en/latest/upgrade.html
- Add new dependencies, most notably: rust, cargo
- Change geoip to maxminddb:
  https://build.opensuse.org/package/view_file/openSUSE:Leap:15.2/GeoIP/README.SUSE
- Disable prelude support: currently broken
  https://redmine.openinfosecfoundation.org/issues/4065

-------------------------------------------------------------------
Tue Apr 28 17:51:33 UTC 2020 - Martin Hauke <mardnh@gmx.de>

- Switch to python3
- Update to version 4.1.8
  * Bug #3492: Backport 4 BUG_ON(strcasecmp(str, “any”) in
    DetectAddressParseString
  * Bug #3508: rule parsing: memory leaks
  * Bug #3527: 4.1.x Kerberos vulnerable to TCP splitting evasion
  * Bug #3533: Skip over ERF_TYPE_META records
  * Bug #3551: file logging: complete files sometimes marked
    ‘TRUNCATED’
  * Bug #3572: rust: smb compile warnings
  * Bug #3579: Faulty signature with two threshold keywords does
    not generate an error and never match
  * Bug #3581: random failures on sip and http-evader
    suricata-verify tests
  * Bug #3596: ftp: asan detects leaks of expectations
  * Bug #3599: rules: memory leaks in pktvar keyword
  * Bug #3601: rules: bad address block leads to stack exhaustion
  * Bug #3603: rules: crash on ‘internal’-only keywords
  * Bug #3605: rules: missing ‘consumption’ of transforms
    before pkt_data would lead to crash
  * Bug #3607: rules: minor memory leak involving
    pcre_get_substring
  * Bug #3608: ssl/tls: ASAN issue in SSLv3ParseHandshakeType
  * Bug #3611: defrag: asan issue
  * Bug #3633: file-store.stream-depth not working as expected
    when configured to a specfic value (4.1.x)
  * Bug #3645: Invalid memory read on malformed rule with Lua
    script
  * Bug #3647: rules: memory leaks on failed rules
  * Bug #3648: CIDR Parsing Issue
  * Bug #3650: FTP response buffering against TCP stream
  * Bug #3652: Recursion stack-overflow in parsing YAML
    configuration
  * Bug #3659: Multiple DetectEngineReload and bad insertion
    into linked list lead to buffer overflow
  * Bug #3666: FTP: Incorrect ftp_memuse calculation.
  * Bug #3668: Signature with an IP range creates one
    IPOnlyCIDRItem by signe IP address
  * Bug #3671: Protocol detection evasion by packet splitting
  * Bug #3676: Segfault on SMTP TLS
  * Feature #3482: GRE ERSPAN Type 1 Support
  * Task #3479: libhtp 0.5.33 (4.1.x)
  * Task #3513: SMTP should place restraints on variable length
    items (e.g., filenames)

-------------------------------------------------------------------
Wed Feb 19 20:27:13 UTC 2020 - Martin Hauke <mardnh@gmx.de>

- Update to 4.1.7
  * Bug #3417: –disable-geoip does not work
  * Bug #3448: Suricata 4.1 Seg Fault: Socket Control pcap-file
    and corrupt pcap
  * Bug #3452: smb: post-GAP file tx handling
  * Bug #3453: coverity: CID 1456680: Incorrect expression
    (IDENTICAL_BRANCHES)
  * Bug #3470: gcc10: compilation failure unless -fcommon is
    supplied
  * Bug #3471: nfs: post-GAP some transactions never close
  * Bug #3472: nfs: post-GAP file tx handling
  * Bug #3474: Dropping privileges does not work with NFLOG
- Update to 4.1.6
  * Bug #3276: address parsing: memory leak in error path
  * Bug #3278: segfault when test a nfs pcap file
  * Bug #3279: ikev2 enabled in config even if Rust is disabled
  * Bug #3325: lua issues on arm (fedora:29)
  * Bug #3326: Static build with pcap fails
  * Bug #3327: tcp: empty SACK option leads to decoder event
  * Bug #3347: BPF filter on command line not honored for pcap
    file
  * Bug #3355: DNS: DNS over TCP transactions logged with wrong
    direction.
  * Bug #3356: DHCP: Slow down over time due to lack of detect
    flags
  * Bug #3369: byte_extract does not work in some situations
  * Bug #3385: fast-log: icmp type prints wrong value
  * Bug #3387: suricata is logging tls log repeatedly if custom
    mode is enabled
  * Bug #3388: TLS Lua output does not work without TLS log
  * Bug #3391: Suricata is unable to get MTU from NIC after
  * Bug #3393: http: pipelining tx id handling broken
  * Bug #3394: TCP evasion technique by overlapping a TCP segment
    with a fake packet
  * Bug #3395: TCP evasion technique by faking a closed TCP sessionl
  * Bug #3402: smb: post-GAP some transactions never close
  * Bug #3403: smb1: ‘event only’ transactions for bad requests
    never close
  * Bug #3404: smtp: file tracking issues when more than one
    attachment in a tx
  * Bug #3405: Filehash rule does not fire without filestore
    keyword
  * Bug #3410: intermittent abort()s at shutdown and in unix-socket
  * Bug #3412: detect/asn1: crashes on packets smaller than offset
    setting
  * Task #3367: configure: Rust 1.37+ has cargo-vendor support
    bundled into cargo
  * Bundle Suricata-Update 1.0.6
  * Bundle Libhtp 0.5.32

-------------------------------------------------------------------
Tue Oct 22 09:24:31 UTC 2019 - Lars Vogdt <lars@linux-schulserver.de>

- Update to 4.1.5
  * Feature #3068: protocol parser: vxlan (4.1.x)
  * Bug #2841: False positive alerts firing after upgrade suricata 3.0 -> 4.1.0 (4.1.x)
  * Bug #2966: filestore (v1 and v2): dropping of “unwanted” files (4.1.x)
  * Bug #3008: rust: updated libc crate causes depration warnings (4.1.x)
  * Bug #3044: tftp: missing logs because of broken tx handling (4.1.x)
  * Bug #3067: GeoIP keyword depends on now discontinued legacy GeoIP database (4.1.x)
  * Bug #3094: Fedora rawhide af-packet compilation err (4.1.x)
  * Bug #3123: bypass keyword: Suricata 4.1.x Segmentation Faults (4.1.x)
  * Bug #3129: Fixes warning about size of integers in string formats (4.1.x)
  * Bug #3159: SC_ERR_PCAP_DISPATCH with message “error code -2” upon rule reload completion (4.1.x)
  * Bug #3164: Suricata 4.1.4: NSS Shutdown triggers crashes in test mode
  * Bug #3168: tls: out of bounds read
  * Bug #3170: defrag: out of bounds read
  * Bug #3173: ipv4: ts field decoding oob read
  * Bug #3175: File_data inspection depth while inspecting base64 decoded data (4.1.x)
  * Bug #3184: decode/der: crafted input can lead to resource starvation
  * Bug #3186: Multiple Content-Length headers causes HTP_STREAM_ERROR (4.1.x)
  * Bug #3187: GET/POST HTTP-request with no Content-Length, http_client_body miss (4.1.x)
- build with lz4 and lzma support, especially to enable compression
- require python-yaml during build, which results in suricate-update
  get's build and installed. This allows to update local
  Suricata rules
- package /var/log/suricata directory instead of creating it during
  post-installation of the package

-------------------------------------------------------------------
Tue May 14 09:35:39 UTC 2019 - Robert Frohl <rfrohl@suse.com>

- Update to version 4.1.4
  * CVE-2019-10053: ssh: heap buffer overflow (boo#1134993)
  * CVE-2019-10050: mpls: heapbuffer overflow in file decode-mpls.c (boo#1134991)
  * decode-ethernet: heapbuffer overflow in file decode-ethernet.c
  * smb 1 create andx request does not parse the filename correctly
  * rust/dhcp: panic in dhcp parser
  * mpls: cast of misaligned data leads to undefined behavior
  * rust/ftp: panic in ftp parser
  * rust/nfs: integer underflow
  * This release includes Suricata-Update 1.0.5

-------------------------------------------------------------------
Thu Mar  7 21:31:14 UTC 2019 - Martin Hauke <mardnh@gmx.de>

- Update to version 4.0.7
  * Failed Assertion, Suricata Abort - util-mpm-hs.c line 163
  * unix runmode deadlock when using too many threads
  * rule reload with workers mode and NFQUEUE not working stable
  * TCP FIN/ACK, RST/ACK in HTTP - detection bypass
  * afpacket doesn't wait for all capture threads to start
  * DNS Golden Transaction ID - detection bypass
  * Invalid detect-engine config could lead to segfault
  * suricata.c ConfigGetCaptureValue - PCAP/AFP fallthrough to
    strip_trailing_plus
  * Stats interval are 1 second too early each tick
  * rust/dns/lua - The Lua calls for DNS values when using Rust
    don't behave the same as the C implementation.
  * out of bounds read in detection
  * smtp: improve pipelining support

-------------------------------------------------------------------
Sun Dec 16 19:44:13 UTC 2018 - mardnh@gmx.de

- Use pkg-config style build dependencies
- Build with support for Hyperscan
- Add systemd service file
- Add logrotate configuration file
- Update to version 4.0.6
  * smtp segmentation fault (4.0.x)
  * negated fileext and filename do not work as expected (4.0.x)
  * filemd5 is not fired in some cases when there are invalid packets
  * File descriptor leak in af-packet mode (4.0.x)
  * Improve errors handling in AF_PACKET (4.0.x)
  * Support http events - Weird unicode characters and truncation in
    some of http_method/http_user_agent fields.

-------------------------------------------------------------------
Tue Jul 24 11:52:06 UTC 2018 - kbabioch@suse.com

- Applied spec-cleaner
- Removed gpg-offline, since we have GPG source validation by default now
- Update to 4.0.5
  - Bug fixes
  - Private Suricata stops inspecting TCP stream if a TCP RST was met (4.0.x)
    (CVE-2018-14568 bsc#1102334)

-------------------------------------------------------------------
Tue Oct  4 23:06:57 UTC 2016 - Greg.Freemyer@gmail.com

- update to v3.1.2
- Fixed an issue with the handling of ICMPv4 error packets (CVE-2016-10728 bsc#1102402)
- build with libprelude suppport
- use libnetfilter_queue, libnfnetlink from the Factory repo instead of 5 year old versions
- use libhtp from server:monitoring
- run through spec-cleaner
- Still don't have man pages or user manual in the RPM
   - http://redmine.openinfosecfoundation.org/projects/suricata/wiki/Suricata_User_Guide
- change license to GPL-2.0

-------------------------------------------------------------------
Fri Feb 12 08:28:27 UTC 2016 - christoph@stop.pe

- Initial release
openSUSE Build Service is sponsored by